import gcc-toolset-9-valgrind-3.15.0-9.el8
This commit is contained in:
commit
ae26ca37e2
1
.gcc-toolset-9-valgrind.metadata
Normal file
1
.gcc-toolset-9-valgrind.metadata
Normal file
@ -0,0 +1 @@
|
||||
4cc014e2390c4bcecb11aa00b37aa52d352db97f SOURCES/valgrind-3.15.0.tar.bz2
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
SOURCES/valgrind-3.15.0.tar.bz2
|
45
SOURCES/valgrind-3.15.0-arm64-ld-stpcpy.patch
Normal file
45
SOURCES/valgrind-3.15.0-arm64-ld-stpcpy.patch
Normal file
@ -0,0 +1,45 @@
|
||||
commit 89423f5d8ba05a099c2c62227a00a4f4eec59eb3
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Tue May 7 21:20:04 2019 +0200
|
||||
|
||||
Intercept stpcpy also in ld.so for arm64
|
||||
|
||||
On other arches stpcpy () is intercepted for both libc.so and ld.so.
|
||||
But not on arm64, where it is only intercepted for libc.so.
|
||||
|
||||
This can cause memcheck warnings about the use of stpcpy () in ld.so
|
||||
when called through dlopen () because ld.so contains its own copy of
|
||||
that functions.
|
||||
|
||||
Fix by introducing VG_Z_LD_LINUX_AARCH64_SO_1 (the encoded name of
|
||||
ld.so on arm64) and using that in vg_replace_strmem.c to intercept
|
||||
stpcpy.
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=407307
|
||||
|
||||
diff --git a/include/pub_tool_redir.h b/include/pub_tool_redir.h
|
||||
index c97941f..15ba67f 100644
|
||||
--- a/include/pub_tool_redir.h
|
||||
+++ b/include/pub_tool_redir.h
|
||||
@@ -313,7 +313,9 @@
|
||||
#define VG_Z_LD_SO_1 ldZdsoZd1 // ld.so.1
|
||||
#define VG_U_LD_SO_1 "ld.so.1"
|
||||
|
||||
+#define VG_Z_LD_LINUX_AARCH64_SO_1 ldZhlinuxZhaarch64ZdsoZd1
|
||||
#define VG_U_LD_LINUX_AARCH64_SO_1 "ld-linux-aarch64.so.1"
|
||||
+
|
||||
#define VG_U_LD_LINUX_ARMHF_SO_3 "ld-linux-armhf.so.3"
|
||||
|
||||
#endif
|
||||
diff --git a/shared/vg_replace_strmem.c b/shared/vg_replace_strmem.c
|
||||
index 89a7dcc..19143cf 100644
|
||||
--- a/shared/vg_replace_strmem.c
|
||||
+++ b/shared/vg_replace_strmem.c
|
||||
@@ -1160,6 +1160,7 @@ static inline void my_exit ( int x )
|
||||
STPCPY(VG_Z_LIBC_SONAME, __stpcpy_sse2_unaligned)
|
||||
STPCPY(VG_Z_LD_LINUX_SO_2, stpcpy)
|
||||
STPCPY(VG_Z_LD_LINUX_X86_64_SO_2, stpcpy)
|
||||
+ STPCPY(VG_Z_LD_LINUX_AARCH64_SO_1,stpcpy)
|
||||
|
||||
#elif defined(VGO_darwin)
|
||||
//STPCPY(VG_Z_LIBC_SONAME, stpcpy)
|
95
SOURCES/valgrind-3.15.0-avx-rdrand-f16c.patch
Normal file
95
SOURCES/valgrind-3.15.0-avx-rdrand-f16c.patch
Normal file
@ -0,0 +1,95 @@
|
||||
commit 791fe5ecf909d573bcbf353b677b9404f9da0ed4
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon May 27 22:19:27 2019 +0200
|
||||
|
||||
Expose rdrand and f16c through cpuid also if the host only has avx.
|
||||
|
||||
The amd64 CPUID dirtyhelpers are mostly static since they emulate some
|
||||
existing CPU "family". The avx2 ("i7-4910MQ") CPUID variant however
|
||||
can "dynamicly" enable rdrand and/or f16c if the host supports them.
|
||||
Do the same for the avx_and_cx16 ("i5-2300") CPUID variant.
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=408009
|
||||
|
||||
diff --git a/VEX/priv/guest_amd64_defs.h b/VEX/priv/guest_amd64_defs.h
|
||||
index 4f34b41..a5de527 100644
|
||||
--- a/VEX/priv/guest_amd64_defs.h
|
||||
+++ b/VEX/priv/guest_amd64_defs.h
|
||||
@@ -165,7 +165,9 @@ extern void amd64g_dirtyhelper_storeF80le ( Addr/*addr*/, ULong/*data*/ );
|
||||
extern void amd64g_dirtyhelper_CPUID_baseline ( VexGuestAMD64State* st );
|
||||
extern void amd64g_dirtyhelper_CPUID_sse3_and_cx16 ( VexGuestAMD64State* st );
|
||||
extern void amd64g_dirtyhelper_CPUID_sse42_and_cx16 ( VexGuestAMD64State* st );
|
||||
-extern void amd64g_dirtyhelper_CPUID_avx_and_cx16 ( VexGuestAMD64State* st );
|
||||
+extern void amd64g_dirtyhelper_CPUID_avx_and_cx16 ( VexGuestAMD64State* st,
|
||||
+ ULong hasF16C,
|
||||
+ ULong hasRDRAND );
|
||||
extern void amd64g_dirtyhelper_CPUID_avx2 ( VexGuestAMD64State* st,
|
||||
ULong hasF16C, ULong hasRDRAND );
|
||||
|
||||
diff --git a/VEX/priv/guest_amd64_helpers.c b/VEX/priv/guest_amd64_helpers.c
|
||||
index e4cf7e2..182bae0 100644
|
||||
--- a/VEX/priv/guest_amd64_helpers.c
|
||||
+++ b/VEX/priv/guest_amd64_helpers.c
|
||||
@@ -3141,8 +3141,11 @@ void amd64g_dirtyhelper_CPUID_sse42_and_cx16 ( VexGuestAMD64State* st )
|
||||
address sizes : 36 bits physical, 48 bits virtual
|
||||
power management:
|
||||
*/
|
||||
-void amd64g_dirtyhelper_CPUID_avx_and_cx16 ( VexGuestAMD64State* st )
|
||||
+void amd64g_dirtyhelper_CPUID_avx_and_cx16 ( VexGuestAMD64State* st,
|
||||
+ ULong hasF16C, ULong hasRDRAND )
|
||||
{
|
||||
+ vassert((hasF16C >> 1) == 0ULL);
|
||||
+ vassert((hasRDRAND >> 1) == 0ULL);
|
||||
# define SET_ABCD(_a,_b,_c,_d) \
|
||||
do { st->guest_RAX = (ULong)(_a); \
|
||||
st->guest_RBX = (ULong)(_b); \
|
||||
@@ -3157,9 +3160,14 @@ void amd64g_dirtyhelper_CPUID_avx_and_cx16 ( VexGuestAMD64State* st )
|
||||
case 0x00000000:
|
||||
SET_ABCD(0x0000000d, 0x756e6547, 0x6c65746e, 0x49656e69);
|
||||
break;
|
||||
- case 0x00000001:
|
||||
- SET_ABCD(0x000206a7, 0x00100800, 0x1f9ae3bf, 0xbfebfbff);
|
||||
+ case 0x00000001: {
|
||||
+ // As a baseline, advertise neither F16C (ecx:29) nor RDRAND (ecx:30),
|
||||
+ // but patch in support for them as directed by the caller.
|
||||
+ UInt ecx_extra
|
||||
+ = (hasF16C ? (1U << 29) : 0) | (hasRDRAND ? (1U << 30) : 0);
|
||||
+ SET_ABCD(0x000206a7, 0x00100800, (0x1f9ae3bf | ecx_extra), 0xbfebfbff);
|
||||
break;
|
||||
+ }
|
||||
case 0x00000002:
|
||||
SET_ABCD(0x76035a01, 0x00f0b0ff, 0x00000000, 0x00ca0000);
|
||||
break;
|
||||
diff --git a/VEX/priv/guest_amd64_toIR.c b/VEX/priv/guest_amd64_toIR.c
|
||||
index 56e992c..96dee38 100644
|
||||
--- a/VEX/priv/guest_amd64_toIR.c
|
||||
+++ b/VEX/priv/guest_amd64_toIR.c
|
||||
@@ -22007,7 +22007,8 @@ Long dis_ESC_0F (
|
||||
|
||||
vassert(fName); vassert(fAddr);
|
||||
IRExpr** args = NULL;
|
||||
- if (fAddr == &amd64g_dirtyhelper_CPUID_avx2) {
|
||||
+ if (fAddr == &amd64g_dirtyhelper_CPUID_avx2
|
||||
+ || fAddr == &amd64g_dirtyhelper_CPUID_avx_and_cx16) {
|
||||
Bool hasF16C = (archinfo->hwcaps & VEX_HWCAPS_AMD64_F16C) != 0;
|
||||
Bool hasRDRAND = (archinfo->hwcaps & VEX_HWCAPS_AMD64_RDRAND) != 0;
|
||||
args = mkIRExprVec_3(IRExpr_GSPTR(),
|
||||
diff --git a/coregrind/m_machine.c b/coregrind/m_machine.c
|
||||
index 3536e57..56a28d1 100644
|
||||
--- a/coregrind/m_machine.c
|
||||
+++ b/coregrind/m_machine.c
|
||||
@@ -1076,10 +1076,10 @@ Bool VG_(machine_get_hwcaps)( void )
|
||||
have_avx2 = (ebx & (1<<5)) != 0; /* True => have AVX2 */
|
||||
}
|
||||
|
||||
- /* Sanity check for RDRAND and F16C. These don't actually *need* AVX2, but
|
||||
- it's convenient to restrict them to the AVX2 case since the simulated
|
||||
- CPUID we'll offer them on has AVX2 as a base. */
|
||||
- if (!have_avx2) {
|
||||
+ /* Sanity check for RDRAND and F16C. These don't actually *need* AVX, but
|
||||
+ it's convenient to restrict them to the AVX case since the simulated
|
||||
+ CPUID we'll offer them on has AVX as a base. */
|
||||
+ if (!have_avx) {
|
||||
have_f16c = False;
|
||||
have_rdrand = False;
|
||||
}
|
374
SOURCES/valgrind-3.15.0-copy_file_range.patch
Normal file
374
SOURCES/valgrind-3.15.0-copy_file_range.patch
Normal file
@ -0,0 +1,374 @@
|
||||
commit 5f00db054a6f59502e9deeeb59ace2261207ee31
|
||||
Author: Alexandra Hajkova <ahajkova@redhat.com>
|
||||
Date: Thu May 2 08:24:02 2019 -0400
|
||||
|
||||
Add support for the copy_file_range syscall
|
||||
|
||||
Support amd64, x86, arm64, ppc64, ppc32 and s390x architectures.
|
||||
Also add sys-copy_file_range test case.
|
||||
|
||||
diff --git a/configure.ac b/configure.ac
|
||||
index d043ce3..3528925 100755
|
||||
--- a/configure.ac
|
||||
+++ b/configure.ac
|
||||
@@ -4172,6 +4172,7 @@ AC_CHECK_FUNCS([ \
|
||||
utimensat \
|
||||
process_vm_readv \
|
||||
process_vm_writev \
|
||||
+ copy_file_range \
|
||||
])
|
||||
|
||||
# AC_CHECK_LIB adds any library found to the variable LIBS, and links these
|
||||
@@ -4187,6 +4188,8 @@ AM_CONDITIONAL([HAVE_PTHREAD_SPINLOCK],
|
||||
[test x$ac_cv_func_pthread_spin_lock = xyes])
|
||||
AM_CONDITIONAL([HAVE_PTHREAD_SETNAME_NP],
|
||||
[test x$ac_cv_func_pthread_setname_np = xyes])
|
||||
+AM_CONDITIONAL([HAVE_COPY_FILE_RANGE],
|
||||
+ [test x$ac_cv_func_copy_file_range = xyes])
|
||||
|
||||
if test x$VGCONF_PLATFORM_PRI_CAPS = xMIPS32_LINUX \
|
||||
-o x$VGCONF_PLATFORM_PRI_CAPS = xMIPS64_LINUX ; then
|
||||
diff --git a/coregrind/m_syswrap/priv_syswrap-linux.h b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
index f76191a..1edf9eb 100644
|
||||
--- a/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
+++ b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
@@ -379,6 +379,7 @@ DECL_TEMPLATE(linux, sys_getsockname);
|
||||
DECL_TEMPLATE(linux, sys_getpeername);
|
||||
DECL_TEMPLATE(linux, sys_socketpair);
|
||||
DECL_TEMPLATE(linux, sys_kcmp);
|
||||
+DECL_TEMPLATE(linux, sys_copy_file_range);
|
||||
|
||||
// Some arch specific functions called from syswrap-linux.c
|
||||
extern Int do_syscall_clone_x86_linux ( Word (*fn)(void *),
|
||||
diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
index 30e7d0e..0c1d8d1 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
@@ -863,6 +863,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_statx, sys_statx), // 332
|
||||
|
||||
LINX_(__NR_membarrier, sys_membarrier), // 324
|
||||
+
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 326
|
||||
};
|
||||
|
||||
SyscallTableEntry* ML_(get_linux_syscall_entry) ( UInt sysno )
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm64-linux.c b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
index 290320a..f66be2d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
@@ -819,7 +819,7 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
// (__NR_userfaultfd, sys_ni_syscall), // 282
|
||||
LINX_(__NR_membarrier, sys_membarrier), // 283
|
||||
// (__NR_mlock2, sys_ni_syscall), // 284
|
||||
- // (__NR_copy_file_range, sys_ni_syscall), // 285
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 285
|
||||
// (__NR_preadv2, sys_ni_syscall), // 286
|
||||
// (__NR_pwritev2, sys_ni_syscall), // 287
|
||||
// (__NR_pkey_mprotect, sys_ni_syscall), // 288
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 73ef98d..cd0ee74 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -12093,6 +12093,36 @@ POST(sys_bpf)
|
||||
}
|
||||
}
|
||||
|
||||
+PRE(sys_copy_file_range)
|
||||
+{
|
||||
+ PRINT("sys_copy_file_range (%lu, %lu, %lu, %lu, %lu, %lu)", ARG1, ARG2, ARG3,
|
||||
+ ARG4, ARG5, ARG6);
|
||||
+
|
||||
+ PRE_REG_READ6(vki_size_t, "copy_file_range",
|
||||
+ int, "fd_in",
|
||||
+ vki_loff_t *, "off_in",
|
||||
+ int, "fd_out",
|
||||
+ vki_loff_t *, "off_out",
|
||||
+ vki_size_t, "len",
|
||||
+ unsigned int, "flags");
|
||||
+
|
||||
+ /* File descriptors are "specially" tracked by valgrind.
|
||||
+ valgrind itself uses some, so make sure someone didn't
|
||||
+ put in one of our own... */
|
||||
+ if (!ML_(fd_allowed)(ARG1, "copy_file_range(fd_in)", tid, False) ||
|
||||
+ !ML_(fd_allowed)(ARG3, "copy_file_range(fd_in)", tid, False)) {
|
||||
+ SET_STATUS_Failure( VKI_EBADF );
|
||||
+ } else {
|
||||
+ /* Now see if the offsets are defined. PRE_MEM_READ will
|
||||
+ double check it can dereference them. */
|
||||
+ if (ARG2 != 0)
|
||||
+ PRE_MEM_READ( "copy_file_range(off_in)", ARG2, sizeof(vki_loff_t));
|
||||
+ if (ARG4 != 0)
|
||||
+ PRE_MEM_READ( "copy_file_range(off_out)", ARG4, sizeof(vki_loff_t));
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+
|
||||
#undef PRE
|
||||
#undef POST
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc32-linux.c b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
index f812f1f..71f208d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
@@ -1021,6 +1021,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 359
|
||||
LINXY(__NR_memfd_create, sys_memfd_create), // 360
|
||||
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 379
|
||||
+
|
||||
LINXY(__NR_statx, sys_statx), // 383
|
||||
};
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc64-linux.c b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
index eada099..1a42c1f 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
@@ -1007,6 +1007,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
|
||||
LINX_(__NR_membarrier, sys_membarrier), // 365
|
||||
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 379
|
||||
+
|
||||
LINXY(__NR_statx, sys_statx), // 383
|
||||
};
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-s390x-linux.c b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
index ad78384..41ada8d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
@@ -854,6 +854,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_recvmsg, sys_recvmsg), // 372
|
||||
LINX_(__NR_shutdown, sys_shutdown), // 373
|
||||
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 375
|
||||
+
|
||||
LINXY(__NR_statx, sys_statx), // 379
|
||||
};
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
index f05619e..f8d97ea 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
@@ -1608,6 +1608,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
|
||||
LINX_(__NR_membarrier, sys_membarrier), // 375
|
||||
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 377
|
||||
+
|
||||
LINXY(__NR_statx, sys_statx), // 383
|
||||
|
||||
/* Explicitly not supported on i386 yet. */
|
||||
diff --git a/memcheck/tests/linux/Makefile.am b/memcheck/tests/linux/Makefile.am
|
||||
index d7515d9..00e99a5 100644
|
||||
--- a/memcheck/tests/linux/Makefile.am
|
||||
+++ b/memcheck/tests/linux/Makefile.am
|
||||
@@ -20,6 +20,7 @@ EXTRA_DIST = \
|
||||
stack_switch.stderr.exp stack_switch.vgtest \
|
||||
syscalls-2007.vgtest syscalls-2007.stderr.exp \
|
||||
syslog-syscall.vgtest syslog-syscall.stderr.exp \
|
||||
+ sys-copy_file_range.vgtest sys-copy_file_range.stderr.exp \
|
||||
sys-openat.vgtest sys-openat.stderr.exp sys-openat.stdout.exp \
|
||||
sys-statx.vgtest sys-statx.stderr.exp \
|
||||
timerfd-syscall.vgtest timerfd-syscall.stderr.exp \
|
||||
@@ -49,6 +50,10 @@ if HAVE_AT_FDCWD
|
||||
check_PROGRAMS += sys-openat
|
||||
endif
|
||||
|
||||
+if HAVE_COPY_FILE_RANGE
|
||||
+ check_PROGRAMS += sys-copy_file_range
|
||||
+endif
|
||||
+
|
||||
AM_CFLAGS += $(AM_FLAG_M3264_PRI)
|
||||
AM_CXXFLAGS += $(AM_FLAG_M3264_PRI)
|
||||
|
||||
diff --git a/memcheck/tests/linux/sys-copy_file_range.c b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
new file mode 100644
|
||||
index 0000000..83981c6
|
||||
--- /dev/null
|
||||
+++ b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
@@ -0,0 +1,67 @@
|
||||
+#define _GNU_SOURCE
|
||||
+#include <fcntl.h>
|
||||
+#include <stdio.h>
|
||||
+#include <stdlib.h>
|
||||
+#include <sys/stat.h>
|
||||
+#include <sys/syscall.h>
|
||||
+#include <unistd.h>
|
||||
+
|
||||
+int main(int argc, char **argv)
|
||||
+{
|
||||
+ int fd_in, fd_out;
|
||||
+ struct stat stat;
|
||||
+ loff_t len, ret;
|
||||
+
|
||||
+ fd_in = open("copy_file_range_source", O_CREAT | O_RDWR);
|
||||
+ if (fd_in == -1) {
|
||||
+ perror("open copy_file_range_source");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+
|
||||
+ if (write(fd_in, "foo bar\n", 8) != 8) {
|
||||
+ perror("writing to the copy_file_range_source");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+ lseek(fd_in, 0, SEEK_SET);
|
||||
+
|
||||
+ if (fstat(fd_in, &stat) == -1) {
|
||||
+ perror("fstat");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+
|
||||
+ len = stat.st_size;
|
||||
+
|
||||
+ fd_out = open("copy_file_range_dest", O_CREAT | O_WRONLY | O_TRUNC, 0644);
|
||||
+ if (fd_out == -1) {
|
||||
+ perror("open copy_file_range_dest");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+
|
||||
+ /* Check copy_file_range called with the correct arguments works. */
|
||||
+ do {
|
||||
+ ret = copy_file_range(fd_in, NULL, fd_out, NULL, len, 0);
|
||||
+ if (ret == -1) {
|
||||
+ perror("copy_file_range");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+
|
||||
+ len -= ret;
|
||||
+ } while (len > 0);
|
||||
+
|
||||
+ /* Check valgrind will produce expected warnings for the
|
||||
+ various wrong arguments. */
|
||||
+ do {
|
||||
+ void *t;
|
||||
+ void *z = (void *) -1;
|
||||
+
|
||||
+ ret = copy_file_range(fd_in, t, fd_out, NULL, len, 0);
|
||||
+ ret = copy_file_range(fd_in, NULL, fd_out, z, len, 0);
|
||||
+ ret = copy_file_range(- 1, NULL, - 1, NULL, len, 0);
|
||||
+ } while (0);
|
||||
+
|
||||
+ close(fd_in);
|
||||
+ close(fd_out);
|
||||
+ unlink("copy_file_range_source");
|
||||
+ unlink("copy_file_range_dest");
|
||||
+ exit(EXIT_SUCCESS);
|
||||
+}
|
||||
diff --git a/memcheck/tests/linux/sys-copy_file_range.stderr.exp b/memcheck/tests/linux/sys-copy_file_range.stderr.exp
|
||||
new file mode 100644
|
||||
index 0000000..1aa4dc2
|
||||
--- /dev/null
|
||||
+++ b/memcheck/tests/linux/sys-copy_file_range.stderr.exp
|
||||
@@ -0,0 +1,21 @@
|
||||
+
|
||||
+Syscall param copy_file_range("off_in") contains uninitialised byte(s)
|
||||
+ ...
|
||||
+ by 0x........: main (sys-copy_file_range.c:57)
|
||||
+
|
||||
+Syscall param copy_file_range(off_out) points to unaddressable byte(s)
|
||||
+ ...
|
||||
+ by 0x........: main (sys-copy_file_range.c:58)
|
||||
+ Address 0x........ is not stack'd, malloc'd or (recently) free'd
|
||||
+
|
||||
+Warning: invalid file descriptor -1 in syscall copy_file_range(fd_in)()
|
||||
+
|
||||
+HEAP SUMMARY:
|
||||
+ in use at exit: 0 bytes in 0 blocks
|
||||
+ total heap usage: 0 allocs, 0 frees, 0 bytes allocated
|
||||
+
|
||||
+For a detailed leak analysis, rerun with: --leak-check=full
|
||||
+
|
||||
+Use --track-origins=yes to see where uninitialised values come from
|
||||
+For lists of detected and suppressed errors, rerun with: -s
|
||||
+ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
diff --git a/memcheck/tests/linux/sys-copy_file_range.vgtest b/memcheck/tests/linux/sys-copy_file_range.vgtest
|
||||
new file mode 100644
|
||||
index 0000000..b7741e8
|
||||
--- /dev/null
|
||||
+++ b/memcheck/tests/linux/sys-copy_file_range.vgtest
|
||||
@@ -0,0 +1,2 @@
|
||||
+prereq: test -e sys-copy_file_range
|
||||
+prog: sys-copy_file_range
|
||||
commit bd27ad3ff31555484b7fdb310c4b033620882e44
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun May 5 16:01:41 2019 +0200
|
||||
|
||||
Hook linux copy_file_range syscall on arm.
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm-linux.c b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
index 9f1bdab..9ba0665 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
@@ -1016,6 +1016,8 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 384
|
||||
LINXY(__NR_memfd_create, sys_memfd_create), // 385
|
||||
|
||||
+ LINX_(__NR_copy_file_range, sys_copy_file_range), // 391
|
||||
+
|
||||
LINXY(__NR_statx, sys_statx), // 397
|
||||
};
|
||||
|
||||
commit c212b72a63e43be323a4e028bbdbe8b023c22be8
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Wed May 15 21:30:00 2019 +0200
|
||||
|
||||
Explicitly make testcase variable for sys-copy_file_range undefined.
|
||||
|
||||
On some systems an extra warning could occur when a variable in
|
||||
the memcheck/tests/linux/sys-copy_file_range testcase was undefined,
|
||||
but (accidentially) pointed to known bad memory. Fix by defining the
|
||||
variable as 0, but then marking it explicitly undefined using memcheck
|
||||
VALGRIND_MAKE_MEM_UNDEFINED.
|
||||
|
||||
Followup for https://bugs.kde.org/show_bug.cgi?id=407218
|
||||
|
||||
diff --git a/memcheck/tests/linux/sys-copy_file_range.c b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
index 83981c6..589399c 100644
|
||||
--- a/memcheck/tests/linux/sys-copy_file_range.c
|
||||
+++ b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
@@ -3,8 +3,8 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <sys/stat.h>
|
||||
-#include <sys/syscall.h>
|
||||
#include <unistd.h>
|
||||
+#include "../../memcheck.h"
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
@@ -51,7 +51,7 @@ int main(int argc, char **argv)
|
||||
/* Check valgrind will produce expected warnings for the
|
||||
various wrong arguments. */
|
||||
do {
|
||||
- void *t;
|
||||
+ void *t = 0; VALGRIND_MAKE_MEM_UNDEFINED (&t, sizeof (void *));
|
||||
void *z = (void *) -1;
|
||||
|
||||
ret = copy_file_range(fd_in, t, fd_out, NULL, len, 0);
|
||||
commit 033d013bebeb3471c0da47060deb9a5771e6c913
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Fri May 24 21:51:31 2019 +0200
|
||||
|
||||
Fix memcheck/tests/linux/sys-copy_file_range open call (mode).
|
||||
|
||||
sys-copy_file_range.c calls open with O_CREAT flag and so must provide
|
||||
a mode argument. valgrind memcheck actually caught this ommission on
|
||||
some arches (fedora rawhide i686 specifically).
|
||||
|
||||
This is a small additional fixup for
|
||||
https://bugs.kde.org/show_bug.cgi?id=407218
|
||||
|
||||
diff --git a/memcheck/tests/linux/sys-copy_file_range.c b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
index 589399c..3022fa1 100644
|
||||
--- a/memcheck/tests/linux/sys-copy_file_range.c
|
||||
+++ b/memcheck/tests/linux/sys-copy_file_range.c
|
||||
@@ -12,7 +12,7 @@ int main(int argc, char **argv)
|
||||
struct stat stat;
|
||||
loff_t len, ret;
|
||||
|
||||
- fd_in = open("copy_file_range_source", O_CREAT | O_RDWR);
|
||||
+ fd_in = open("copy_file_range_source", O_CREAT | O_RDWR, 0644);
|
||||
if (fd_in == -1) {
|
||||
perror("open copy_file_range_source");
|
||||
exit(EXIT_FAILURE);
|
34
SOURCES/valgrind-3.15.0-disable-s390x-z13.patch
Normal file
34
SOURCES/valgrind-3.15.0-disable-s390x-z13.patch
Normal file
@ -0,0 +1,34 @@
|
||||
diff -ur valgrind-3.14.0.orig/VEX/priv/guest_s390_helpers.c valgrind-3.14.0/VEX/priv/guest_s390_helpers.c
|
||||
--- valgrind-3.14.0.orig/VEX/priv/guest_s390_helpers.c 2019-01-10 17:00:57.203206690 +0100
|
||||
+++ valgrind-3.14.0/VEX/priv/guest_s390_helpers.c 2019-01-10 17:06:23.335253900 +0100
|
||||
@@ -2469,7 +2469,7 @@
|
||||
/*--- Dirty helper for vector instructions ---*/
|
||||
/*------------------------------------------------------------*/
|
||||
|
||||
-#if defined(VGA_s390x)
|
||||
+#if defined(VGA_s390x) && 0 /* disable for old binutils */
|
||||
ULong
|
||||
s390x_dirtyhelper_vec_op(VexGuestS390XState *guest_state,
|
||||
const ULong serialized)
|
||||
diff -ur valgrind-3.14.0.orig/none/tests/s390x/Makefile.am valgrind-3.14.0/none/tests/s390x/Makefile.am
|
||||
--- valgrind-3.14.0.orig/none/tests/s390x/Makefile.am 2019-01-10 17:00:57.411202894 +0100
|
||||
+++ valgrind-3.14.0/none/tests/s390x/Makefile.am 2019-01-10 17:10:28.963776813 +0100
|
||||
@@ -18,8 +18,7 @@
|
||||
spechelper-cr spechelper-clr \
|
||||
spechelper-ltr spechelper-or \
|
||||
spechelper-icm-1 spechelper-icm-2 spechelper-tmll \
|
||||
- spechelper-tm laa vector lsc2 ppno vector_string vector_integer \
|
||||
- vector_float
|
||||
+ spechelper-tm laa
|
||||
|
||||
if BUILD_DFP_TESTS
|
||||
INSN_TESTS += dfp-1 dfp-2 dfp-3 dfp-4 dfptest dfpext dfpconv srnmt pfpo
|
||||
@@ -68,8 +67,3 @@
|
||||
fixbr_CFLAGS = $(AM_CFLAGS) @FLAG_MLONG_DOUBLE_128@
|
||||
fpext_CFLAGS = $(AM_CFLAGS) @FLAG_MLONG_DOUBLE_128@
|
||||
ex_clone_LDADD = -lpthread
|
||||
-vector_CFLAGS = $(AM_CFLAGS) -march=z13
|
||||
-lsc2_CFLAGS = -march=z13 -DS390_TESTS_NOCOLOR
|
||||
-vector_string_CFLAGS = $(AM_CFLAGS) -march=z13 -DS390_TEST_COUNT=5
|
||||
-vector_integer_CFLAGS = $(AM_CFLAGS) -march=z13 -DS390_TEST_COUNT=4
|
||||
-vector_float_CFLAGS = $(AM_CFLAGS) -march=z13 -DS390_TEST_COUNT=4
|
29
SOURCES/valgrind-3.15.0-exp-sgcheck-no-aarch64.patch
Normal file
29
SOURCES/valgrind-3.15.0-exp-sgcheck-no-aarch64.patch
Normal file
@ -0,0 +1,29 @@
|
||||
commit 59784c512ec40e588b21cf5ae8e31e9c4f99d6b8
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sat May 18 14:55:50 2019 +0200
|
||||
|
||||
aarch64 (arm64) isn't a supported architecture for exp-sgcheck.
|
||||
|
||||
exp-sgcheck/pc_main.c contains:
|
||||
|
||||
#if defined(VGA_arm) || defined(VGA_arm64)
|
||||
VG_(printf)("SGCheck doesn't work on ARM yet, sorry.\n");
|
||||
VG_(exit)(1);
|
||||
#endif
|
||||
|
||||
But exp-sgcheck/tests/is_arch_supported checked against uname -m
|
||||
which returns aarch64 (not arm64). Fix the test check so the
|
||||
exp-sgcheck tests are skipped instead of producing failures.
|
||||
|
||||
diff --git a/exp-sgcheck/tests/is_arch_supported b/exp-sgcheck/tests/is_arch_supported
|
||||
index 818cc61..d4c6191 100755
|
||||
--- a/exp-sgcheck/tests/is_arch_supported
|
||||
+++ b/exp-sgcheck/tests/is_arch_supported
|
||||
@@ -10,6 +10,6 @@
|
||||
# architectures.
|
||||
|
||||
case `uname -m` in
|
||||
- ppc*|arm*|s390x|mips*) exit 1;;
|
||||
+ ppc*|aarch64|arm*|s390x|mips*) exit 1;;
|
||||
*) exit 0;;
|
||||
esac
|
226
SOURCES/valgrind-3.15.0-pkey.patch
Normal file
226
SOURCES/valgrind-3.15.0-pkey.patch
Normal file
@ -0,0 +1,226 @@
|
||||
commit b064131bdf099d3647b4501e5d15391e1e9623e6
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Thu May 30 00:29:58 2019 +0200
|
||||
|
||||
linux x86 and amd64 memory protection key syscalls.
|
||||
|
||||
This implements minimal support for the pkey_alloc, pkey_free and
|
||||
pkey_mprotect syscalls. pkey_alloc will simply indicate that pkeys
|
||||
are not supported. pkey_free always fails. pkey_mprotect works just
|
||||
like mprotect if the special pkey -1 is provided.
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=408091
|
||||
|
||||
diff --git a/coregrind/m_syswrap/priv_syswrap-generic.h b/coregrind/m_syswrap/priv_syswrap-generic.h
|
||||
index 88530f0..3e1c8b6 100644
|
||||
--- a/coregrind/m_syswrap/priv_syswrap-generic.h
|
||||
+++ b/coregrind/m_syswrap/priv_syswrap-generic.h
|
||||
@@ -106,6 +106,10 @@ extern Bool
|
||||
ML_(handle_auxv_open)(SyscallStatus *status, const HChar *filename,
|
||||
int flags);
|
||||
|
||||
+/* Helper function for generic mprotect and linux pkey_mprotect. */
|
||||
+extern void handle_sys_mprotect (ThreadId tid, SyscallStatus *status,
|
||||
+ Addr *addr, SizeT *len, Int *prot);
|
||||
+
|
||||
DECL_TEMPLATE(generic, sys_ni_syscall); // * P -- unimplemented
|
||||
DECL_TEMPLATE(generic, sys_exit);
|
||||
DECL_TEMPLATE(generic, sys_fork);
|
||||
diff --git a/coregrind/m_syswrap/priv_syswrap-linux.h b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
index 5cf5407..2471524 100644
|
||||
--- a/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
+++ b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
@@ -299,6 +299,11 @@ DECL_TEMPLATE(linux, sys_bpf);
|
||||
// Linux-specific (new in Linux 4.11)
|
||||
DECL_TEMPLATE(linux, sys_statx);
|
||||
|
||||
+// Linux-specific memory protection key syscalls (since Linux 4.9)
|
||||
+DECL_TEMPLATE(linux, sys_pkey_alloc);
|
||||
+DECL_TEMPLATE(linux, sys_pkey_free);
|
||||
+DECL_TEMPLATE(linux, sys_pkey_mprotect);
|
||||
+
|
||||
/* ---------------------------------------------------------------------
|
||||
Wrappers for sockets and ipc-ery. These are split into standalone
|
||||
procedures because x86-linux hides them inside multiplexors
|
||||
diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
index d4fe413..2d6b95f 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
@@ -863,6 +863,10 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_membarrier, sys_membarrier), // 324
|
||||
|
||||
LINX_(__NR_copy_file_range, sys_copy_file_range), // 326
|
||||
+
|
||||
+ LINXY(__NR_pkey_mprotect, sys_pkey_mprotect), // 329
|
||||
+ LINX_(__NR_pkey_alloc, sys_pkey_alloc), // 330
|
||||
+ LINX_(__NR_pkey_free, sys_pkey_free), // 331
|
||||
};
|
||||
|
||||
SyscallTableEntry* ML_(get_linux_syscall_entry) ( UInt sysno )
|
||||
diff --git a/coregrind/m_syswrap/syswrap-generic.c b/coregrind/m_syswrap/syswrap-generic.c
|
||||
index 0b64919..01191f6 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-generic.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-generic.c
|
||||
@@ -3842,12 +3842,28 @@ PRE(sys_mprotect)
|
||||
PRE_REG_READ3(long, "mprotect",
|
||||
unsigned long, addr, vki_size_t, len, unsigned long, prot);
|
||||
|
||||
- if (!ML_(valid_client_addr)(ARG1, ARG2, tid, "mprotect")) {
|
||||
+ Addr addr = ARG1;
|
||||
+ SizeT len = ARG2;
|
||||
+ Int prot = ARG3;
|
||||
+
|
||||
+ handle_sys_mprotect (tid, status, &addr, &len, &prot);
|
||||
+
|
||||
+ ARG1 = addr;
|
||||
+ ARG2 = len;
|
||||
+ ARG3 = prot;
|
||||
+}
|
||||
+/* This will be called from the generic mprotect, or the linux specific
|
||||
+ pkey_mprotect. Pass pointers to ARG1, ARG2 and ARG3 as addr, len and prot,
|
||||
+ they might be adjusted and have to assigned back to ARG1, ARG2 and ARG3. */
|
||||
+void handle_sys_mprotect(ThreadId tid, SyscallStatus* status,
|
||||
+ Addr *addr, SizeT *len, Int *prot)
|
||||
+{
|
||||
+ if (!ML_(valid_client_addr)(*addr, *len, tid, "mprotect")) {
|
||||
SET_STATUS_Failure( VKI_ENOMEM );
|
||||
}
|
||||
#if defined(VKI_PROT_GROWSDOWN)
|
||||
else
|
||||
- if (ARG3 & (VKI_PROT_GROWSDOWN|VKI_PROT_GROWSUP)) {
|
||||
+ if (*prot & (VKI_PROT_GROWSDOWN|VKI_PROT_GROWSUP)) {
|
||||
/* Deal with mprotects on growable stack areas.
|
||||
|
||||
The critical files to understand all this are mm/mprotect.c
|
||||
@@ -3862,8 +3878,8 @@ PRE(sys_mprotect)
|
||||
|
||||
The sanity check provided by the kernel is that the vma must
|
||||
have the VM_GROWSDOWN/VM_GROWSUP flag set as appropriate. */
|
||||
- UInt grows = ARG3 & (VKI_PROT_GROWSDOWN|VKI_PROT_GROWSUP);
|
||||
- NSegment const *aseg = VG_(am_find_nsegment)(ARG1);
|
||||
+ UInt grows = *prot & (VKI_PROT_GROWSDOWN|VKI_PROT_GROWSUP);
|
||||
+ NSegment const *aseg = VG_(am_find_nsegment)(*addr);
|
||||
NSegment const *rseg;
|
||||
|
||||
vg_assert(aseg);
|
||||
@@ -3874,10 +3890,10 @@ PRE(sys_mprotect)
|
||||
&& rseg->kind == SkResvn
|
||||
&& rseg->smode == SmUpper
|
||||
&& rseg->end+1 == aseg->start) {
|
||||
- Addr end = ARG1 + ARG2;
|
||||
- ARG1 = aseg->start;
|
||||
- ARG2 = end - aseg->start;
|
||||
- ARG3 &= ~VKI_PROT_GROWSDOWN;
|
||||
+ Addr end = *addr + *len;
|
||||
+ *addr = aseg->start;
|
||||
+ *len = end - aseg->start;
|
||||
+ *prot &= ~VKI_PROT_GROWSDOWN;
|
||||
} else {
|
||||
SET_STATUS_Failure( VKI_EINVAL );
|
||||
}
|
||||
@@ -3887,8 +3903,8 @@ PRE(sys_mprotect)
|
||||
&& rseg->kind == SkResvn
|
||||
&& rseg->smode == SmLower
|
||||
&& aseg->end+1 == rseg->start) {
|
||||
- ARG2 = aseg->end - ARG1 + 1;
|
||||
- ARG3 &= ~VKI_PROT_GROWSUP;
|
||||
+ *len = aseg->end - *addr + 1;
|
||||
+ *prot &= ~VKI_PROT_GROWSUP;
|
||||
} else {
|
||||
SET_STATUS_Failure( VKI_EINVAL );
|
||||
}
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 810ca24..5452b8d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -12120,6 +12120,76 @@ PRE(sys_copy_file_range)
|
||||
}
|
||||
}
|
||||
|
||||
+PRE(sys_pkey_alloc)
|
||||
+{
|
||||
+ PRINT("pkey_alloc (%lu, %lu)", ARG1, ARG2);
|
||||
+
|
||||
+ PRE_REG_READ2(long, "pkey_alloc",
|
||||
+ unsigned long, "flags",
|
||||
+ unsigned long, "access_rights");
|
||||
+
|
||||
+ /* The kernel says: pkey_alloc() is always safe to call regardless of
|
||||
+ whether or not the operating system supports protection keys. It can be
|
||||
+ used in lieu of any other mechanism for detecting pkey support and will
|
||||
+ simply fail with the error ENOSPC if the operating system has no pkey
|
||||
+ support.
|
||||
+
|
||||
+ So we simply always return ENOSPC to signal memory protection keys are
|
||||
+ not supported under valgrind, unless there are unknown flags, then we
|
||||
+ return EINVAL. */
|
||||
+ unsigned long pkey_flags = ARG1;
|
||||
+ if (pkey_flags != 0)
|
||||
+ SET_STATUS_Failure( VKI_EINVAL );
|
||||
+ else
|
||||
+ SET_STATUS_Failure( VKI_ENOSPC );
|
||||
+}
|
||||
+
|
||||
+PRE(sys_pkey_free)
|
||||
+{
|
||||
+ PRINT("pkey_free (%" FMT_REGWORD "u )", ARG1);
|
||||
+
|
||||
+ PRE_REG_READ1(long, "pkey_free",
|
||||
+ unsigned long, "pkey");
|
||||
+
|
||||
+ /* Since pkey_alloc () can never succeed, see above, freeing any pkey is
|
||||
+ always an error. */
|
||||
+ SET_STATUS_Failure( VKI_EINVAL );
|
||||
+}
|
||||
+
|
||||
+PRE(sys_pkey_mprotect)
|
||||
+{
|
||||
+ PRINT("sys_pkey_mprotect ( %#" FMT_REGWORD "x, %" FMT_REGWORD "u, %"
|
||||
+ FMT_REGWORD "u %" FMT_REGWORD "u )", ARG1, ARG2, ARG3, ARG4);
|
||||
+ PRE_REG_READ4(long, "pkey_mprotect",
|
||||
+ unsigned long, addr, vki_size_t, len, unsigned long, prot,
|
||||
+ unsigned long, pkey);
|
||||
+
|
||||
+ Addr addr = ARG1;
|
||||
+ SizeT len = ARG2;
|
||||
+ Int prot = ARG3;
|
||||
+ Int pkey = ARG4;
|
||||
+
|
||||
+ /* Since pkey_alloc () can never succeed, see above, any pkey is
|
||||
+ invalid. Except for -1, then pkey_mprotect acts just like mprotect. */
|
||||
+ if (pkey != -1)
|
||||
+ SET_STATUS_Failure( VKI_EINVAL );
|
||||
+ else
|
||||
+ handle_sys_mprotect (tid, status, &addr, &len, &prot);
|
||||
+
|
||||
+ ARG1 = addr;
|
||||
+ ARG2 = len;
|
||||
+ ARG3 = prot;
|
||||
+}
|
||||
+
|
||||
+POST(sys_pkey_mprotect)
|
||||
+{
|
||||
+ Addr addr = ARG1;
|
||||
+ SizeT len = ARG2;
|
||||
+ Int prot = ARG3;
|
||||
+
|
||||
+ ML_(notify_core_and_tool_of_mprotect)(addr, len, prot);
|
||||
+}
|
||||
+
|
||||
|
||||
#undef PRE
|
||||
#undef POST
|
||||
diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
index ad54cf6..3829fa4 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
@@ -1608,6 +1608,9 @@ static SyscallTableEntry syscall_table[] = {
|
||||
|
||||
LINX_(__NR_copy_file_range, sys_copy_file_range), // 377
|
||||
|
||||
+ LINXY(__NR_pkey_mprotect, sys_pkey_mprotect), // 380
|
||||
+ LINX_(__NR_pkey_alloc, sys_pkey_alloc), // 381
|
||||
+ LINX_(__NR_pkey_free, sys_pkey_free), // 382
|
||||
LINXY(__NR_statx, sys_statx), // 383
|
||||
|
||||
/* Explicitly not supported on i386 yet. */
|
117
SOURCES/valgrind-3.15.0-pkglibexecdir.patch
Normal file
117
SOURCES/valgrind-3.15.0-pkglibexecdir.patch
Normal file
@ -0,0 +1,117 @@
|
||||
diff --git a/Makefile.all.am b/Makefile.all.am
|
||||
index 3786e34..1befef5 100644
|
||||
--- a/Makefile.all.am
|
||||
+++ b/Makefile.all.am
|
||||
@@ -50,20 +50,20 @@ inplace-noinst_DSYMS: build-noinst_DSYMS
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make install". It copies $(noinst_PROGRAMS) into $prefix/lib/valgrind/.
|
||||
+# "make install". It copies $(noinst_PROGRAMS) into $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'install-exec-local' rule.
|
||||
install-noinst_PROGRAMS: $(noinst_PROGRAMS)
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibdir); \
|
||||
+ $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/lib/valgrind/.
|
||||
+# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'uninstall-local' rule.
|
||||
uninstall-noinst_PROGRAMS:
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f; \
|
||||
done
|
||||
|
||||
# Similar to install-noinst_PROGRAMS.
|
||||
@@ -71,15 +71,15 @@ uninstall-noinst_PROGRAMS:
|
||||
# directories. XXX: not sure whether the resulting permissions will be
|
||||
# correct when using 'cp -R'...
|
||||
install-noinst_DSYMS: build-noinst_DSYMS
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- cp -R $$f.dSYM $(DESTDIR)$(pkglibdir); \
|
||||
+ cp -R $$f.dSYM $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# Similar to uninstall-noinst_PROGRAMS.
|
||||
uninstall-noinst_DSYMS:
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f.dSYM; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f.dSYM; \
|
||||
done
|
||||
|
||||
# This needs to be depended on by a 'clean-local' rule.
|
||||
diff --git a/Makefile.am b/Makefile.am
|
||||
index 242b38a..3b7c806 100644
|
||||
--- a/Makefile.am
|
||||
+++ b/Makefile.am
|
||||
@@ -58,7 +58,7 @@ DEFAULT_SUPP_FILES = @DEFAULT_SUPP@
|
||||
# default.supp, as it is built from the base .supp files at compile-time.
|
||||
dist_noinst_DATA = $(SUPP_FILES)
|
||||
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = default.supp
|
||||
|
||||
pkgconfigdir = $(libdir)/pkgconfig
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 94030fd..f09763a 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -11,12 +11,12 @@ include $(top_srcdir)/Makefile.all.am
|
||||
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_PRI@-@VGCONF_OS@\""
|
||||
if VGCONF_HAVE_PLATFORM_SEC
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_SEC_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_SEC@-@VGCONF_OS@\""
|
||||
endif
|
||||
|
||||
@@ -714,7 +714,7 @@ GDBSERVER_XML_FILES = \
|
||||
m_gdbserver/mips64-fpu.xml
|
||||
|
||||
# so as to make sure these get copied into the install tree
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = $(GDBSERVER_XML_FILES)
|
||||
|
||||
# so as to make sure these get copied into the tarball
|
||||
diff --git a/mpi/Makefile.am b/mpi/Makefile.am
|
||||
index 7ad9a25..471fee0 100644
|
||||
--- a/mpi/Makefile.am
|
||||
+++ b/mpi/Makefile.am
|
||||
@@ -18,16 +18,18 @@ EXTRA_DIST = \
|
||||
# libmpiwrap-<platform>.so
|
||||
#----------------------------------------------------------------------------
|
||||
|
||||
-noinst_PROGRAMS =
|
||||
+# These are really real libraries, so they should go to libdir, not libexec.
|
||||
+mpidir = $(pkglibdir)
|
||||
+mpi_PROGRAMS =
|
||||
if BUILD_MPIWRAP_PRI
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
endif
|
||||
if BUILD_MPIWRAP_SEC
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
endif
|
||||
|
||||
if VGCONF_OS_IS_DARWIN
|
||||
-noinst_DSYMS = $(noinst_PROGRAMS)
|
||||
+mpi_DSYMS = $(mpi_PROGRAMS)
|
||||
endif
|
||||
|
||||
|
22
SOURCES/valgrind-3.15.0-ppc64-filter_gdb.patch
Normal file
22
SOURCES/valgrind-3.15.0-ppc64-filter_gdb.patch
Normal file
@ -0,0 +1,22 @@
|
||||
commit b1cc37ddb660afc536131227a9fb452ac9328972
|
||||
Author: Alexandra Hájková <ahajkova@redhat.com>
|
||||
Date: Mon Apr 15 15:34:12 2019 +0200
|
||||
|
||||
filter_gdb: add regexp to filter out names which starts with a "."
|
||||
|
||||
such names are used for "function descriptors" on ppc64
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=406561
|
||||
|
||||
diff --git a/gdbserver_tests/filter_gdb b/gdbserver_tests/filter_gdb
|
||||
index 6eff229..fd2e8e7 100755
|
||||
--- a/gdbserver_tests/filter_gdb
|
||||
+++ b/gdbserver_tests/filter_gdb
|
||||
@@ -119,6 +119,7 @@ sed -e '/Remote debugging using/,/vgdb launched process attached/d'
|
||||
-e 's/in select ()$/in syscall .../' \
|
||||
-e 's/in \.__select ()$/in syscall .../' \
|
||||
-e 's/in select () at \.\.\/sysdeps\/unix\/syscall-template\.S.*$/in syscall .../' \
|
||||
+ -e 's/in \.__select () at \.\.\/sysdeps\/unix\/syscall-template\.S.*$/in syscall .../' \
|
||||
-e '/^[ ]*at \.\.\/sysdeps\/unix\/syscall-template\.S/d' \
|
||||
-e '/^[ ]*in \.\.\/sysdeps\/unix\/syscall-template\.S/d' \
|
||||
-e '/^[1-9][0-9]*[ ]*\.\.\/sysdeps\/unix\/syscall-template\.S/d' \
|
194
SOURCES/valgrind-3.15.0-s390x-wrap-drd.patch
Normal file
194
SOURCES/valgrind-3.15.0-s390x-wrap-drd.patch
Normal file
@ -0,0 +1,194 @@
|
||||
From bfa89eae00ba7067445bc0532e1f17405c062954 Mon Sep 17 00:00:00 2001
|
||||
From: Andreas Arnez <arnez@linux.ibm.com>
|
||||
Date: Thu, 23 May 2019 17:17:43 +0200
|
||||
Subject: [PATCH] Bug 407764 - s390x: drd fails on z13 due to function wrapping
|
||||
issue
|
||||
|
||||
The s390x-specific inline assembly macros for function wrapping in
|
||||
include/valgrind.h have a few issues.
|
||||
|
||||
When the compiler uses vector registers, such as with "-march=z13", all
|
||||
vector registers must be declared as clobbered by the callee. Because
|
||||
this is missing, many drd test failures are seen with "-march=z13".
|
||||
|
||||
Also, the inline assemblies write the return value into the target
|
||||
register before restoring r11. If r11 is used as the target register,
|
||||
this means that the restore operation corrupts the result. This bug
|
||||
causes failures with memcheck's "wrap6" test case.
|
||||
|
||||
These bugs are fixed. The clobber list is extended by the vector
|
||||
registers (if appropriate), and the target register is now written at the
|
||||
end, after restoring r11.
|
||||
---
|
||||
include/valgrind.h | 38 +++++++++++++++++++++++---------------
|
||||
1 file changed, 23 insertions(+), 15 deletions(-)
|
||||
|
||||
diff --git a/include/valgrind.h b/include/valgrind.h
|
||||
index f071bd392..815efa893 100644
|
||||
--- a/include/valgrind.h
|
||||
+++ b/include/valgrind.h
|
||||
@@ -4687,8 +4687,16 @@ typedef
|
||||
r14 in s390_irgen_noredir (VEX/priv/guest_s390_irgen.c) to give the
|
||||
function a proper return address. All others are ABI defined call
|
||||
clobbers. */
|
||||
-#define __CALLER_SAVED_REGS "0","1","2","3","4","5","14", \
|
||||
- "f0","f1","f2","f3","f4","f5","f6","f7"
|
||||
+#if defined(__VX__) || defined(__S390_VX__)
|
||||
+#define __CALLER_SAVED_REGS "0", "1", "2", "3", "4", "5", "14", \
|
||||
+ "v0", "v1", "v2", "v3", "v4", "v5", "v6", "v7", \
|
||||
+ "v8", "v9", "v10", "v11", "v12", "v13", "v14", "v15", \
|
||||
+ "v16", "v17", "v18", "v19", "v20", "v21", "v22", "v23", \
|
||||
+ "v24", "v25", "v26", "v27", "v28", "v29", "v30", "v31"
|
||||
+#else
|
||||
+#define __CALLER_SAVED_REGS "0", "1", "2", "3", "4", "5", "14", \
|
||||
+ "f0", "f1", "f2", "f3", "f4", "f5", "f6", "f7"
|
||||
+#endif
|
||||
|
||||
/* Nb: Although r11 is modified in the asm snippets below (inside
|
||||
VALGRIND_CFI_PROLOGUE) it is not listed in the clobber section, for
|
||||
@@ -4710,9 +4718,9 @@ typedef
|
||||
"aghi 15,-160\n\t" \
|
||||
"lg 1, 0(1)\n\t" /* target->r1 */ \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "d" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"7" \
|
||||
@@ -4734,9 +4742,9 @@ typedef
|
||||
"lg 2, 8(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"7" \
|
||||
@@ -4759,9 +4767,9 @@ typedef
|
||||
"lg 3,16(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"7" \
|
||||
@@ -4786,9 +4794,9 @@ typedef
|
||||
"lg 4,24(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"7" \
|
||||
@@ -4815,9 +4823,9 @@ typedef
|
||||
"lg 5,32(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"7" \
|
||||
@@ -4846,9 +4854,9 @@ typedef
|
||||
"lg 6,40(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,160\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -4880,9 +4888,9 @@ typedef
|
||||
"mvc 160(8,15), 48(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,168\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -4916,9 +4924,9 @@ typedef
|
||||
"mvc 168(8,15), 56(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,176\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -4954,9 +4962,9 @@ typedef
|
||||
"mvc 176(8,15), 64(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,184\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -4994,9 +5002,9 @@ typedef
|
||||
"mvc 184(8,15), 72(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,192\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -5036,9 +5044,9 @@ typedef
|
||||
"mvc 192(8,15), 80(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,200\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -5080,9 +5088,9 @@ typedef
|
||||
"mvc 200(8,15), 88(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,208\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
@@ -5126,9 +5134,9 @@ typedef
|
||||
"mvc 208(8,15), 96(1)\n\t" \
|
||||
"lg 1, 0(1)\n\t" \
|
||||
VALGRIND_CALL_NOREDIR_R1 \
|
||||
- "lgr %0, 2\n\t" \
|
||||
"aghi 15,216\n\t" \
|
||||
VALGRIND_CFI_EPILOGUE \
|
||||
+ "lgr %0, 2\n\t" \
|
||||
: /*out*/ "=d" (_res) \
|
||||
: /*in*/ "a" (&_argvec[0]) __FRAME_POINTER \
|
||||
: /*trash*/ "cc", "memory", __CALLER_SAVED_REGS,"6","7" \
|
||||
--
|
||||
2.17.0
|
||||
|
83
SOURCES/valgrind-3.15.0-scalar-arm64.patch
Normal file
83
SOURCES/valgrind-3.15.0-scalar-arm64.patch
Normal file
@ -0,0 +1,83 @@
|
||||
commit 917e423073c5eacffbad83008c27c8e61e0e342a
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon May 20 00:09:59 2019 +0200
|
||||
|
||||
Make memcheck/tests/arm64-linux/scalar test work under root.
|
||||
|
||||
Running the testsuite as root isn't really recommended.
|
||||
But lets not make tests fail unnecessarily when running as root.
|
||||
Pass really invalid arguments to setuid, setgid, acct and fchown.
|
||||
Make setresgid, setresuid, setregid and setreuid always succeed.
|
||||
|
||||
diff --git a/memcheck/tests/arm64-linux/scalar.c b/memcheck/tests/arm64-linux/scalar.c
|
||||
index fd49db6..622ea1c 100644
|
||||
--- a/memcheck/tests/arm64-linux/scalar.c
|
||||
+++ b/memcheck/tests/arm64-linux/scalar.c
|
||||
@@ -136,7 +136,7 @@ int main(void)
|
||||
|
||||
// __NR_setuid 23
|
||||
GO(__NR_setuid, "1s 0m");
|
||||
- SY(__NR_setuid, x0); FAIL;
|
||||
+ SY(__NR_setuid, x0-1); FAIL;
|
||||
|
||||
// __NR_getuid 24
|
||||
GO(__NR_getuid, "0s 0m");
|
||||
@@ -229,7 +229,7 @@ int main(void)
|
||||
|
||||
// __NR_setgid 46
|
||||
GO(__NR_setgid, "1s 0m");
|
||||
- SY(__NR_setgid, x0); FAIL;
|
||||
+ SY(__NR_setgid, x0-1); FAIL;
|
||||
|
||||
// __NR_getgid 47
|
||||
GO(__NR_getgid, "0s 0m");
|
||||
@@ -249,7 +249,7 @@ int main(void)
|
||||
|
||||
// __NR_acct 51
|
||||
GO(__NR_acct, "1s 1m");
|
||||
- SY(__NR_acct, x0); FAIL;
|
||||
+ SY(__NR_acct, x0-1); FAIL;
|
||||
|
||||
// __NR_umount2 52
|
||||
GO(__NR_umount2, "2s 1m");
|
||||
@@ -340,11 +340,11 @@ int main(void)
|
||||
|
||||
// __NR_setreuid 70
|
||||
GO(__NR_setreuid, "2s 0m");
|
||||
- SY(__NR_setreuid, x0, x0); FAIL;
|
||||
+ SY(__NR_setreuid, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_setregid 71
|
||||
GO(__NR_setregid, "2s 0m");
|
||||
- SY(__NR_setregid, x0, x0); FAIL;
|
||||
+ SY(__NR_setregid, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_sigsuspend arm64 only has rt_sigsuspend
|
||||
// XXX: how do you use this function?
|
||||
@@ -447,7 +447,7 @@ int main(void)
|
||||
|
||||
// __NR_fchown 95
|
||||
GO(__NR_fchown, "3s 0m");
|
||||
- SY(__NR_fchown, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_fchown, x0-1, x0, x0); FAIL;
|
||||
|
||||
// __NR_getpriority 96
|
||||
GO(__NR_getpriority, "2s 0m");
|
||||
@@ -733,7 +733,7 @@ int main(void)
|
||||
|
||||
// __NR_setresuid 164
|
||||
GO(__NR_setresuid, "3s 0m");
|
||||
- SY(__NR_setresuid, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresuid, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresuid 165
|
||||
GO(__NR_getresuid, "3s 3m");
|
||||
@@ -757,7 +757,7 @@ int main(void)
|
||||
|
||||
// __NR_setresgid 170
|
||||
GO(__NR_setresgid, "3s 0m");
|
||||
- SY(__NR_setresgid, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresgid, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresgid 171
|
||||
GO(__NR_getresgid, "3s 3m");
|
137
SOURCES/valgrind-3.15.0-scalar-x86.patch
Normal file
137
SOURCES/valgrind-3.15.0-scalar-x86.patch
Normal file
@ -0,0 +1,137 @@
|
||||
commit abc09f23e1ad55a07beb827aef969acfe6c496ef
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon May 20 13:08:41 2019 +0200
|
||||
|
||||
Make memcheck/tests/x86-linux/scalar test work under root.
|
||||
|
||||
Running the testsuite as root isn't really recommended.
|
||||
But lets not make tests fail unnecessarily when running as root.
|
||||
Similar to the arm64-linux/scalar fixes. Plus 32bit variants that
|
||||
don't exist on arm64.
|
||||
|
||||
Pass really invalid arguments to setuid[32], setgid[32], acct, fchown[32].
|
||||
Make setresgid[32], setresuid[32], setregid[32], setreuid[32] always succeed.
|
||||
|
||||
diff --git a/memcheck/tests/x86-linux/scalar.c b/memcheck/tests/x86-linux/scalar.c
|
||||
index 213a5ad..52f0d4e 100644
|
||||
--- a/memcheck/tests/x86-linux/scalar.c
|
||||
+++ b/memcheck/tests/x86-linux/scalar.c
|
||||
@@ -145,7 +145,7 @@ int main(void)
|
||||
|
||||
// __NR_setuid 23
|
||||
GO(__NR_setuid, "1s 0m");
|
||||
- SY(__NR_setuid, x0); FAIL;
|
||||
+ SY(__NR_setuid, x0-1); FAIL;
|
||||
|
||||
// __NR_getuid 24
|
||||
GO(__NR_getuid, "0s 0m");
|
||||
@@ -238,7 +238,7 @@ int main(void)
|
||||
|
||||
// __NR_setgid 46
|
||||
GO(__NR_setgid, "1s 0m");
|
||||
- SY(__NR_setgid, x0); FAIL;
|
||||
+ SY(__NR_setgid, x0-1); FAIL;
|
||||
|
||||
// __NR_getgid 47
|
||||
GO(__NR_getgid, "0s 0m");
|
||||
@@ -258,7 +258,7 @@ int main(void)
|
||||
|
||||
// __NR_acct 51
|
||||
GO(__NR_acct, "1s 1m");
|
||||
- SY(__NR_acct, x0); FAIL;
|
||||
+ SY(__NR_acct, x0-1); FAIL;
|
||||
|
||||
// __NR_umount2 52
|
||||
GO(__NR_umount2, "2s 1m");
|
||||
@@ -349,11 +349,11 @@ int main(void)
|
||||
|
||||
// __NR_setreuid 70
|
||||
GO(__NR_setreuid, "2s 0m");
|
||||
- SY(__NR_setreuid, x0, x0); FAIL;
|
||||
+ SY(__NR_setreuid, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_setregid 71
|
||||
GO(__NR_setregid, "2s 0m");
|
||||
- SY(__NR_setregid, x0, x0); FAIL;
|
||||
+ SY(__NR_setregid, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_sigsuspend 72
|
||||
// XXX: how do you use this function?
|
||||
@@ -456,7 +456,7 @@ int main(void)
|
||||
|
||||
// __NR_fchown 95
|
||||
GO(__NR_fchown, "3s 0m");
|
||||
- SY(__NR_fchown, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_fchown, x0-1, x0, x0); FAIL;
|
||||
|
||||
// __NR_getpriority 96
|
||||
GO(__NR_getpriority, "2s 0m");
|
||||
@@ -742,7 +742,7 @@ int main(void)
|
||||
|
||||
// __NR_setresuid 164
|
||||
GO(__NR_setresuid, "3s 0m");
|
||||
- SY(__NR_setresuid, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresuid, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresuid 165
|
||||
GO(__NR_getresuid, "3s 3m");
|
||||
@@ -766,7 +766,7 @@ int main(void)
|
||||
|
||||
// __NR_setresgid 170
|
||||
GO(__NR_setresgid, "3s 0m");
|
||||
- SY(__NR_setresgid, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresgid, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresgid 171
|
||||
GO(__NR_getresgid, "3s 3m");
|
||||
@@ -923,11 +923,11 @@ int main(void)
|
||||
|
||||
// __NR_setreuid32 203
|
||||
GO(__NR_setreuid32, "2s 0m");
|
||||
- SY(__NR_setreuid32, x0, x0); FAIL;
|
||||
+ SY(__NR_setreuid32, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_setregid32 204
|
||||
GO(__NR_setregid32, "2s 0m");
|
||||
- SY(__NR_setregid32, x0, x0); FAIL;
|
||||
+ SY(__NR_setregid32, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getgroups32 205
|
||||
GO(__NR_getgroups32, "2s 1m");
|
||||
@@ -939,11 +939,11 @@ int main(void)
|
||||
|
||||
// __NR_fchown32 207
|
||||
GO(__NR_fchown32, "3s 0m");
|
||||
- SY(__NR_fchown32, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_fchown32, x0-1, x0, x0); FAIL;
|
||||
|
||||
// __NR_setresuid32 208
|
||||
GO(__NR_setresuid32, "3s 0m");
|
||||
- SY(__NR_setresuid32, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresuid32, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresuid32 209
|
||||
GO(__NR_getresuid32, "3s 3m");
|
||||
@@ -951,7 +951,7 @@ int main(void)
|
||||
|
||||
// __NR_setresgid32 210
|
||||
GO(__NR_setresgid32, "3s 0m");
|
||||
- SY(__NR_setresgid32, x0, x0, x0); FAIL;
|
||||
+ SY(__NR_setresgid32, x0-1, x0-1, x0-1); SUCC;
|
||||
|
||||
// __NR_getresgid32 211
|
||||
GO(__NR_getresgid32, "3s 3m");
|
||||
@@ -963,11 +963,11 @@ int main(void)
|
||||
|
||||
// __NR_setuid32 213
|
||||
GO(__NR_setuid32, "1s 0m");
|
||||
- SY(__NR_setuid32, x0); FAIL;
|
||||
+ SY(__NR_setuid32, x0-1); FAIL;
|
||||
|
||||
// __NR_setgid32 214
|
||||
GO(__NR_setgid32, "1s 0m");
|
||||
- SY(__NR_setgid32, x0); FAIL;
|
||||
+ SY(__NR_setgid32, x0-1); FAIL;
|
||||
|
||||
// __NR_setfsuid32 215
|
||||
GO(__NR_setfsuid32, "1s 0m");
|
72
SOURCES/valgrind-3.15.0-some-Wl-z-now.patch
Normal file
72
SOURCES/valgrind-3.15.0-some-Wl-z-now.patch
Normal file
@ -0,0 +1,72 @@
|
||||
commit d3c977726064ba09fed6dfc7daf22b16824c97b4
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Fri May 24 18:24:56 2019 +0200
|
||||
|
||||
Add -Wl,-z,now to some binaries.
|
||||
|
||||
diff --git a/auxprogs/Makefile.am b/auxprogs/Makefile.am
|
||||
index 1b7842b..e211eec 100644
|
||||
--- a/auxprogs/Makefile.am
|
||||
+++ b/auxprogs/Makefile.am
|
||||
@@ -32,7 +32,7 @@ valgrind_listener_SOURCES = valgrind-listener.c
|
||||
valgrind_listener_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_listener_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
valgrind_listener_CFLAGS += -static
|
||||
endif
|
||||
@@ -51,7 +51,7 @@ valgrind_di_server_SOURCES = valgrind-di-server.c
|
||||
valgrind_di_server_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_di_server_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
valgrind_di_server_CFLAGS += -static
|
||||
endif
|
||||
@@ -86,7 +86,7 @@ getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_SOURCES = getoff.c
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CPPFLAGS = $(AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@) -fstack-protector-strong
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
if HAVE_DLINFO_RTLD_DI_TLS_MODID
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDADD = $(LDADD) -ldl
|
||||
endif
|
||||
diff --git a/cachegrind/Makefile.am b/cachegrind/Makefile.am
|
||||
index f572741..1c07e50 100644
|
||||
--- a/cachegrind/Makefile.am
|
||||
+++ b/cachegrind/Makefile.am
|
||||
@@ -27,7 +27,7 @@ cg_merge_SOURCES = cg_merge.c
|
||||
cg_merge_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
cg_merge_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
cg_merge_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-cg_merge_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+cg_merge_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
# then the primary platform must be x86-darwin. Hence:
|
||||
if ! VGCONF_HAVE_PLATFORM_SEC
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 3c73210..fb6b7bb 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -57,7 +57,7 @@ RANLIB = ${LTO_RANLIB}
|
||||
valgrind_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
valgrind_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
# then the primary platform must be x86-darwin. Hence:
|
||||
if ! VGCONF_HAVE_PLATFORM_SEC
|
||||
@@ -96,7 +96,7 @@ endif
|
||||
vgdb_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
vgdb_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
vgdb_CFLAGS += -static
|
||||
endif
|
118
SOURCES/valgrind-3.15.0-some-stack-protector.patch
Normal file
118
SOURCES/valgrind-3.15.0-some-stack-protector.patch
Normal file
@ -0,0 +1,118 @@
|
||||
commit b73fb7a614e1b5d60af23fb0752b5cead995e02e
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Apr 14 00:30:05 2019 +0200
|
||||
|
||||
Remove no-stack-protector, add stack-protector-strong to some.
|
||||
|
||||
diff --git a/auxprogs/Makefile.am b/auxprogs/Makefile.am
|
||||
index 56cc5ef..1b7842b 100644
|
||||
--- a/auxprogs/Makefile.am
|
||||
+++ b/auxprogs/Makefile.am
|
||||
@@ -30,7 +30,7 @@ bin_PROGRAMS = valgrind-listener valgrind-di-server
|
||||
|
||||
valgrind_listener_SOURCES = valgrind-listener.c
|
||||
valgrind_listener_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
-valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_listener_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
@@ -49,7 +49,7 @@ endif
|
||||
|
||||
valgrind_di_server_SOURCES = valgrind-di-server.c
|
||||
valgrind_di_server_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
-valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_di_server_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
@@ -84,7 +84,7 @@ endif
|
||||
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_SOURCES = getoff.c
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CPPFLAGS = $(AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
-getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
+getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@) -fstack-protector-strong
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
if HAVE_DLINFO_RTLD_DI_TLS_MODID
|
||||
diff --git a/cachegrind/Makefile.am b/cachegrind/Makefile.am
|
||||
index f8447a1..f572741 100644
|
||||
--- a/cachegrind/Makefile.am
|
||||
+++ b/cachegrind/Makefile.am
|
||||
@@ -25,7 +25,7 @@ bin_PROGRAMS = cg_merge
|
||||
|
||||
cg_merge_SOURCES = cg_merge.c
|
||||
cg_merge_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-cg_merge_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+cg_merge_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
cg_merge_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
cg_merge_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
diff --git a/configure.ac b/configure.ac
|
||||
index f8c798b..ccc8f52 100755
|
||||
--- a/configure.ac
|
||||
+++ b/configure.ac
|
||||
@@ -2188,24 +2188,24 @@ AC_LANG(C)
|
||||
AC_SUBST(FLAG_FALIGNED_NEW)
|
||||
|
||||
# does this compiler support -fno-stack-protector ?
|
||||
-AC_MSG_CHECKING([if gcc accepts -fno-stack-protector])
|
||||
-
|
||||
-safe_CFLAGS=$CFLAGS
|
||||
-CFLAGS="-fno-stack-protector -Werror"
|
||||
-
|
||||
-AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[]], [[
|
||||
- return 0;
|
||||
-]])], [
|
||||
-no_stack_protector=yes
|
||||
-FLAG_FNO_STACK_PROTECTOR="-fno-stack-protector"
|
||||
-AC_MSG_RESULT([yes])
|
||||
-], [
|
||||
-no_stack_protector=no
|
||||
+#AC_MSG_CHECKING([if gcc accepts -fno-stack-protector])
|
||||
+#
|
||||
+#safe_CFLAGS=$CFLAGS
|
||||
+#CFLAGS="-fno-stack-protector -Werror"
|
||||
+#
|
||||
+#AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[]], [[
|
||||
+# return 0;
|
||||
+#]])], [
|
||||
+#no_stack_protector=yes
|
||||
+#FLAG_FNO_STACK_PROTECTOR="-fno-stack-protector"
|
||||
+#AC_MSG_RESULT([yes])
|
||||
+#], [
|
||||
+#no_stack_protector=no
|
||||
FLAG_FNO_STACK_PROTECTOR=""
|
||||
-AC_MSG_RESULT([no])
|
||||
-])
|
||||
-CFLAGS=$safe_CFLAGS
|
||||
-
|
||||
+#AC_MSG_RESULT([no])
|
||||
+#])
|
||||
+#CFLAGS=$safe_CFLAGS
|
||||
+#
|
||||
AC_SUBST(FLAG_FNO_STACK_PROTECTOR)
|
||||
|
||||
# does this compiler support -finline-functions ?
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 94030fd..3c73210 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -55,7 +55,7 @@ AR = ${LTO_AR}
|
||||
RANLIB = ${LTO_RANLIB}
|
||||
|
||||
valgrind_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS)
|
||||
+valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
valgrind_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
@@ -94,7 +94,7 @@ vgdb_SOURCES += vgdb-invoker-solaris.c
|
||||
endif
|
||||
|
||||
vgdb_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS)
|
||||
+vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
vgdb_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
54
SOURCES/valgrind-3.9.0-cachegrind-improvements.patch
Normal file
54
SOURCES/valgrind-3.9.0-cachegrind-improvements.patch
Normal file
@ -0,0 +1,54 @@
|
||||
--- valgrind-3.8.1/cachegrind/cg_sim.c.jj 2011-10-26 23:24:32.000000000 +0200
|
||||
+++ valgrind-3.8.1/cachegrind/cg_sim.c 2011-12-09 17:31:19.256023683 +0100
|
||||
@@ -42,27 +42,30 @@ typedef struct {
|
||||
Int size; /* bytes */
|
||||
Int assoc;
|
||||
Int line_size; /* bytes */
|
||||
- Int sets;
|
||||
Int sets_min_1;
|
||||
Int line_size_bits;
|
||||
Int tag_shift;
|
||||
- HChar desc_line[128]; /* large enough */
|
||||
UWord* tags;
|
||||
-} cache_t2;
|
||||
+ HChar desc_line[128];
|
||||
+} cache_t2
|
||||
+#ifdef __GNUC__
|
||||
+__attribute__ ((aligned (8 * sizeof (Int))))
|
||||
+#endif
|
||||
+;
|
||||
|
||||
/* By this point, the size/assoc/line_size has been checked. */
|
||||
static void cachesim_initcache(cache_t config, cache_t2* c)
|
||||
{
|
||||
- Int i;
|
||||
+ Int sets;
|
||||
|
||||
c->size = config.size;
|
||||
c->assoc = config.assoc;
|
||||
c->line_size = config.line_size;
|
||||
|
||||
- c->sets = (c->size / c->line_size) / c->assoc;
|
||||
- c->sets_min_1 = c->sets - 1;
|
||||
+ sets = (c->size / c->line_size) / c->assoc;
|
||||
+ c->sets_min_1 = sets - 1;
|
||||
c->line_size_bits = VG_(log2)(c->line_size);
|
||||
- c->tag_shift = c->line_size_bits + VG_(log2)(c->sets);
|
||||
+ c->tag_shift = c->line_size_bits + VG_(log2)(sets);
|
||||
|
||||
if (c->assoc == 1) {
|
||||
VG_(sprintf)(c->desc_line, "%d B, %d B, direct-mapped",
|
||||
@@ -72,11 +75,8 @@ static void cachesim_initcache(cache_t c
|
||||
c->size, c->line_size, c->assoc);
|
||||
}
|
||||
|
||||
- c->tags = VG_(malloc)("cg.sim.ci.1",
|
||||
- sizeof(UWord) * c->sets * c->assoc);
|
||||
-
|
||||
- for (i = 0; i < c->sets * c->assoc; i++)
|
||||
- c->tags[i] = 0;
|
||||
+ c->tags = VG_(calloc)("cg.sim.ci.1",
|
||||
+ sizeof(UWord), sets * c->assoc);
|
||||
}
|
||||
|
||||
/* This attribute forces GCC to inline the function, getting rid of a
|
15
SOURCES/valgrind-3.9.0-helgrind-race-supp.patch
Normal file
15
SOURCES/valgrind-3.9.0-helgrind-race-supp.patch
Normal file
@ -0,0 +1,15 @@
|
||||
--- valgrind/glibc-2.34567-NPTL-helgrind.supp.jj 2009-08-19 15:37:48.000000000 +0200
|
||||
+++ valgrind/glibc-2.34567-NPTL-helgrind.supp 2009-10-21 16:46:31.000000000 +0200
|
||||
@@ -88,6 +88,12 @@
|
||||
obj:*/lib*/libpthread-2.*so*
|
||||
}
|
||||
{
|
||||
+ helgrind-glibc2X-102a
|
||||
+ Helgrind:Race
|
||||
+ fun:mythread_wrapper
|
||||
+ obj:*vgpreload_helgrind*.so
|
||||
+}
|
||||
+{
|
||||
helgrind-glibc2X-103
|
||||
Helgrind:Race
|
||||
fun:pthread_cond_*@@GLIBC_2.*
|
28
SOURCES/valgrind-3.9.0-ldso-supp.patch
Normal file
28
SOURCES/valgrind-3.9.0-ldso-supp.patch
Normal file
@ -0,0 +1,28 @@
|
||||
--- valgrind/glibc-2.X.supp.in.jj 2011-10-26 23:24:45.000000000 +0200
|
||||
+++ valgrind/glibc-2.X.supp.in 2012-05-07 10:55:20.395942656 +0200
|
||||
@@ -124,7 +124,7 @@
|
||||
glibc-2.5.x-on-SUSE-10.2-(PPC)-2a
|
||||
Memcheck:Cond
|
||||
fun:index
|
||||
- obj:*ld-@GLIBC_VERSION@.*.so
|
||||
+ obj:*ld-@GLIBC_VERSION@*.so
|
||||
}
|
||||
{
|
||||
glibc-2.5.x-on-SuSE-10.2-(PPC)-2b
|
||||
@@ -136,14 +136,14 @@
|
||||
glibc-2.5.5-on-SuSE-10.2-(PPC)-2c
|
||||
Memcheck:Addr4
|
||||
fun:index
|
||||
- obj:*ld-@GLIBC_VERSION@.*.so
|
||||
+ obj:*ld-@GLIBC_VERSION@*.so
|
||||
}
|
||||
{
|
||||
glibc-2.3.5-on-SuSE-10.1-(PPC)-3
|
||||
Memcheck:Addr4
|
||||
fun:*wordcopy_fwd_dest_aligned*
|
||||
fun:mem*cpy
|
||||
- obj:*lib*@GLIBC_VERSION@.*.so
|
||||
+ obj:*lib*@GLIBC_VERSION@*.so
|
||||
}
|
||||
|
||||
{
|
1803
SPECS/valgrind.spec
Normal file
1803
SPECS/valgrind.spec
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user